Search
Now showing items 161-170 of 224
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
(
IEEE Computer Society
, 2022 , Article)
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid
(
IEEE Computer Society
, 2020 , Article)
Smart systems, including smart grid (SG) and Internet of Things (IoT), have been playing a critical role in addressing contemporary issues. Taking full advantage of the big data generated by the smart grid can enhance the ...
A survey on 5G/6G, AI, and Robotics
(
Elsevier Ltd
, 2021 , Article)
The development of various fields of computer is constantly improving people's lives. In recent years, the most obvious is the development of Artificial Intelligence (AI). Computer vision is applied to face recognition, ...
Applications of blockchain in unmanned aerial vehicles: A review
(
Elsevier Inc.
, 2020 , Other)
The recent advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing processes, and communication and networking technology has led to a rise in their usage in civilian and commercial applications. The ...
ECBCM: A prestige-based edge computing blockchain security consensus model
(
John Wiley and Sons Inc
, 2021 , Article)
The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing data processing. To solve this problem, edge computing technology came into being. Because the ...
Secure Fog-assisted Sharing for Multimedia Health Records in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In recent years, multimedia has been widely used in the medical and health fields and plays a pivotal role in personal health records (PHR). In the PHR system, people can easily access to their PHR data, which is mainly ...
SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study
(
Association for Computing Machinery
, 2021 , Book Review)
Software-defined networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The controller in the control plane is the ...
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks
(
IEEE Computer Society
, 2021 , Article)
Ultra-dense mobile networks (UDMNs) represent a promising technology for improving the network performance and providing the ubiquitous network accessibility in the beyond 5 G (B5G) mobile networks. Heterogenous densely ...
Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Unmanned aerial vehicles (UAVs) have played an important role in air-ground integration network. Especially in Internet of Things (IoT) services, UAV equipped with communication equipments is widely adopted as a mobile ...
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities
(
Association for Computing Machinery
, 2021 , Article)
Aerial scenes captured by UAVs have immense potential in IoT applications related to urban surveillance, road and building segmentation, land cover classification, and so on, which are necessary for the evolution of smart ...